Lucene search

K
nessusThis script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.PHP_5_5_15.NASL
HistoryJul 25, 2014 - 12:00 a.m.

PHP 5.5.x < 5.5.15 Multiple Vulnerabilities

2014-07-2500:00:00
This script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
83

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%

According to its banner, the version of PHP 5.5.x in use on the remote web server is a version prior to 5.5.15. It is, therefore, affected by the following vulnerabilities :

  • A use-after-free error exists in the file ‘ext/spl/spl_dllist.c’ related to the Standard PHP Library (SPL). Using a specially crafted iterator, an attacker could cause a denial of service condition or other unspecified impacts. (CVE-2014-4670)

  • A use-after-free error exists in the file ‘ext/spl/spl_array.c’ related to the Standard PHP Library (SPL). This could allow an attacker, using ‘ArrayObjects’ or ‘ArrayIterator’, to cause a denial of service condition or other unspecified impacts.
    (CVE-2014-4698)

  • The function ‘sapi_cli_server_send_headers’ in the file ‘sapi/cli/php_cli_server.c’ contains an error that does not properly handle an empty ‘header’ parameter and could allow denial of service attacks. Note that this issue affects only the built-in command line development server.

Note that Nessus has not attempted to exploit these issues, but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(76772);
  script_version("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");

  script_cve_id("CVE-2014-4670", "CVE-2014-4698");
  script_bugtraq_id(68511, 68513);

  script_name(english:"PHP 5.5.x < 5.5.15 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server uses a version of PHP that is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its banner, the version of PHP 5.5.x in use on the remote
web server is a version prior to 5.5.15. It is, therefore, affected by
the following vulnerabilities :

  - A use-after-free error exists in the file
    'ext/spl/spl_dllist.c' related to the Standard PHP
    Library (SPL). Using a specially crafted iterator,
    an attacker could cause a denial of service condition
    or other unspecified impacts. (CVE-2014-4670)

  - A use-after-free error exists in the file
    'ext/spl/spl_array.c' related to the Standard PHP
    Library (SPL). This could allow an attacker, using
    'ArrayObjects' or 'ArrayIterator', to cause a denial
    of service condition or other unspecified impacts.
    (CVE-2014-4698)

  - The function 'sapi_cli_server_send_headers' in the file
    'sapi/cli/php_cli_server.c' contains an error that does
    not properly handle an empty 'header' parameter and
    could allow denial of service attacks. Note that this
    issue affects only the built-in command line development
    server.

Note that Nessus has not attempted to exploit these issues, but has
instead relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://bugs.php.net/bug.php?id=67539");
  script_set_attribute(attribute:"see_also", value:"https://bugs.php.net/bug.php?id=67538");
  script_set_attribute(attribute:"see_also", value:"https://bugs.php.net/bug.php?id=66830");
  script_set_attribute(attribute:"see_also", value:"http://www.php.net/ChangeLog-5.php#5.5.15");
  script_set_attribute(attribute:"solution", value:
"Upgrade to PHP version 5.5.15 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-4698");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/07/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/25");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:php:php");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("php_version.nasl");
  script_require_keys("www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80, php:TRUE);
php = get_php_from_kb(port:port, exit_on_fail:TRUE);

version = php["ver"];
source = php["src"];

backported = get_kb_item('www/php/'+port+'/'+version+'/backported');

if (report_paranoia < 2 && backported) audit(AUDIT_BACKPORT_SERVICE, port, "PHP "+version+" install");

# Check that it is the correct version of PHP
if (version =~ "^5(\.5)?$") audit(AUDIT_VER_NOT_GRANULAR, "PHP", port, version);
if (version !~ "^5\.5\.") audit(AUDIT_NOT_DETECT, "PHP version 5.5.x", port);

if (version =~ "^5\.5\.([0-9]|1[0-4])($|[^0-9])")
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Version source    : '+source +
      '\n  Installed version : '+version+
      '\n  Fixed version     : 5.5.15\n';
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
else audit(AUDIT_LISTEN_NOT_VULN, "PHP", port, version);
VendorProductVersionCPE
phpphpcpe:/a:php:php

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%